ABSTRACT

In 1983 Frank Easterbrook had probably not considered the network of computers that was growing around him while he worked at the University of Chicago. While it would be another 13 years until his attack on the network, and those who choose to study legal-regulatory constructs within it,1

Easterbrook’s work that year shadowed some of the foundations of his later assault and provides a useful background to this chapter.